Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-25169

Winstone potentially vulnerable to POODLE (CVE-2014-3566)

XMLWordPrintable

      $ JENKINS_HOME=/tmp/POODLE java -jar .../war/target/jenkins.war --httpsPort=4430 &
      # wait until started...
      $ if echo Q | openssl s_client -connect localhost:4430 -ssl3 2>&1 | grep -q "Cipher.*0000"; then echo "SSLv3 disabled"; else echo "SSLv3 enabled"; fi
      SSLv3 enabled
      

      It ought to be blocked by default.

            kohsuke Kohsuke Kawaguchi
            jglick Jesse Glick
            Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

              Created:
              Updated:
              Resolved: